Fake sites spreading malware claim Obama won't take oath

Sites claiming President-Elect Barack Obama will refuse to take the oath of office Tuesday are serving up attack code believed to be programmed by the same hackers responsible for the notorious Storm bot Trojan, researchers said this weekend.

According to researchers at several security companies, including F-Secure Corp. , MX Logic Inc. and Trend Micro Inc. , spam campaigns are in gear that try to trick users into visiting malicious Web sites hosting variations of "Waledec," the Trojan horse thought to be the successor to Storm.

Sam Masiello, vice president of information security at MX Logic, was one of the first to call attention to the attacks, which begin with one-line spam messages such as "Haven't you heard latest news about our president-elect?", "Barack Obama abandoned sinking ship," and "Obama doesn't wany [sic] anymore to be a president."

The links in those messages lead to a legitimate-looking site that resembles the real Obama-Biden campaign site . The fake site contains both bogus and real news stories. At the top of the page is a story with the headline "Barack Obama has refused to be a president," that includes text which reads, "On the Eve of Inauguration Day President-elect Barack Obama made statement. He declared that he is definitely NOT ready for this position."

Clicking on a link to read more of the story triggers a download of an executable file that is in fact a variant of the relatively-new Waledec , according to researchers at Trend Micro and F-Secure.

Waledec has been linked to 2008's Storm by researchers including Joe Stewart , director of research at Atlanta-based SecureWorks Inc. and one of the leading experts on botnets. Last week, Stewart released a new census of the world's biggest botnets, and put Waledec in the No. 9 spot with an estimated 10,000 hijacked Windows PCs under its control.

Waledec, said Stewart, shows all the signs of having been written by the same group, if not the same person, that crafted Storm. "It's so similar that it's unlikely that it's a different group," he said last week, citing the similarity of the messages that start the attacks, as well as the malware's coding.

The Waledec bot first began infecting systems just before Christmas , and used phony holiday greetings and e-cards -- a tactic also employed by Storm during 2008 -- as bait.

"As is often the case with these new outbreaks, [antivirus] detection is scarce so be aware of this new tactic," Masiello said in an entry to the MX Logic security blog Friday evening. The Englewood, Colo.-based company was tracking approximately 4,000 fake Obama e-mails per hour on Saturday.

Obama is scheduled to take the oath of office as the 44th U.S. president on Tuesday in Washington D.C. One real concern is that the planned live-streaming of the event will tax the Internet's capabilities. Experts, however, have said that they expect no widespread outages as users watch the inauguration on sites such as CNN.com.

This story, "Fake sites spreading malware claim Obama won't take oath" was originally published by Computerworld.

What’s wrong? The new clean desk test
Join the discussion
Be the first to comment on this article. Our Commenting Policies